|
|
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 28th International Conference on Information Security and Cryptology on Information Security and Cryptology – ICISC 2025, held in Seoul, South Korea, during November 19–21, 2025. The 28 full papers included in this book were carefully reviewed and selected from 74 submissions.They were organized in topical sections as follows:AI-Driven Threat Detection & Federated Learning; Generative & Steganographic Security Applications; Post-Quantum Cryptography & Migration; Side-Channel & Fault Analysis in PQC; Network & Application Security; Quantum Cryptanalysis & Theoretical Limits; Implementation & Hardware Acceleration; Symmetric Cryptanalysis & New Constructions; Advanced Cryptographic Protocols & Signatures. Full Product DetailsAuthor: Hwajeong SeoPublisher: Springer Verlag, Singapore Imprint: Springer Verlag, Singapore ISBN: 9789819580330ISBN 10: 9819580331 Pages: 558 Publication Date: 01 May 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- AI-Driven Threat Detection & Federated Learning. .- Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages. .- Tabular or Image Input? Transformers for NIDS: A Comparative Study. .- AdvCodeGen: Adversarial Code Generation via Large Language Models. .- Generative & Steganographic Security Applications. .- Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification. .- Improving Scalable Clustering for IoT Malware via Code Region Extraction. .- PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies. .- Post-Quantum Cryptography & Migration. .- Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach. .- On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment. .- Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption. .- Side-Channel & Fault Analysis in PQC. .- Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method. .- Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion. .- Quantum Circuit Implementation and Resource Analysis of AIM2. .- Network & Application Security. .- Comprehensive Security Analysis of End-to-End Encryption in LINE. .- Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection. .- Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function. .- Quantum Cryptanalysis & Theoretical Limits. .- Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare. .- Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256. .- Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function. .- Impossibility Results of Card-Based Protocols via Mathematical Optimization. .- Implementation & Hardware Acceleration. .- High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers. .- Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU. .- Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation. .- Symmetric Cryptanalysis & New Constructions. .- On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks. .- On the Weak Differential Resistance of MGFN and the Exploration of Variants. .- New Derivation Rule for Linear Approximations and Its Application to ChaCha. .- Advanced Cryptographic Protocols & Signatures. .- Strong Designated Verifier Signatures with Non-delegatability from CSIDH. .- An Undeniable Signature Scheme Utilizing Module Lattices. .- A Witness Encryption for Quadratic Arithmetic Programs.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||